Cybersecurity and Privacy

Cyber icon

Protecting Critical Information

Federal departments and agencies (D&As) need innovative cybersecurity and privacy (CS&P) approaches, methodologies, and best practices that address interoperability, usability, and privacy adapted to their unique mission and business environment. To secure the Confidentiality, Integrity, and Availability of our customers’ networks and systems today while continuously evolving to defeat the cyber threats of tomorrow, Criterion has invested in leading edge solutions and resources, including:

Cybersecurity Center of Excellence (CoE) – Leveraging the combined expertise of our 250+ certified/cleared cybersecurity professionals, Criterion’s Cyber CoE establishes and maintains best practices to enable consistent delivery, execution, and evolution of cybersecurity services across our portfolio of Defense and Civilian agency customers. Learn more: https://criterion-sys.com/centers-of-excellence#cybersecurity/

Cybersecurity Operations Maturity Model (COMM) – Criterion’s COMM provides a structured manner to manage and enhance the efficiency and effectiveness of organizational and enterprise CS&P programs and operations. Work starts with a Cyber Operations Review (COR), powered by CyberScale®, Criterion’s U.S. patented compliance and risk management tool.  Learn more: https://criterion-sys.com/cyber-operations-maturity-model/

Dedicated Cyber Recruiting TeamSpecializing in identifying, recruiting, and retaining the best and brightest cybersecurity professionals, our dedicated recruiting team enables Criterion to provide cleared and certified staff across the life of our cyber contracts. See our open positions.

Core Capabilities

Cybersecurity Engineering and Technical Services

Provides services and capabilities including engineering, implementation, operation, and maintenance support for information system security controls that are implemented through technical mechanisms in system hardware or software.

  • Information System Security Engineering (ISSE)/Security Control Support
  • Cyber Defense Technology/Information System Protection Support
  • Enterprise and Security Architecture Support
  • IT and Cybersecurity Integration
  • Cybersecurity Infrastructure Operations and Maintenance (O&M)
  • CS&P Product Research, Evaluation, Testing, and Secure Configuration Support
  • Secure IT Development, Design, and Implementation Support

Cybersecurity Governance and Program Management Services

Provides services and capabilities including development, implementation, assessment, improvement, maintenance, and governance support for all cross-cutting aspects of the organizational cybersecurity program.

  • Data Security Support
  • CS&P Program Execution
  • CS&P Policy and Governance
  • Risk Management Framework (RMF) Support
  • Enterprise Vulnerability Management and Mitigation Program Support
  • CS&P Training Support

Cybersecurity Operations Services

Provides services and capabilities including implementation, operation, and maintenance support for information system security controls executed primarily by people.

  • Security Operations Center Support
  • Focused Operations Services
  • National Security Systems Cybersecurity Support
  • Intelligence Community Cybersecurity Support
  • Information Operations Support
  • Critical Infrastructure Protection Planning and Program Support
  • Industrial Control Systems (ICS) Support
  • Privacy Protection Support
  • Cyber Hunt Framework

Cybersecurity Compliance, Risk Management, and Continuous Monitoring Services

Provides services and capabilities including development, implementation, assessment, improvement, and maintenance support for cybersecurity program and system compliance activities, assessment and management of system and organizational level cybersecurity risk, and ongoing conduct of system and organizational continuous monitoring activities.

  • CS&P Program and System Audit Support
  • Command Cyber Readiness Inspection (CCRI) Support
  • Cybersecurity Service Provider (CSSP)
  • Site Assistance Visits (SAVs)
  • Information Operations Condition Implementation
  • Security Assessment and Authorization (SA&A)/RMF Support
  • Information Systems Continuous Monitoring (ISCM) Support
  • Risk Management and Risk Assessment Support
  • Cyber Supply Chain Risk Management Support

Cybersecurity Thought Leadership

Here are our latest blog posts on cybersecurity-related topics written by Criterion subject matter experts.